VB2014 preview: Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam

Posted by   Virus Bulletin on   Sep 22, 2014

Jérôme Segura looks at recent developments in malicious cold calls.

In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, in the final entry in this series, we look at the paper 'Tech Support Scams 2.0: an inside look into the evolution of the classic Microsoft tech support scam' , by Jérôme Segura (Malwarebytes).

Two years ago, at VB2012 in Dallas, I co-presented a paper on tech support scams. Somewhat naively, I expected the scams to die out before too long: soon, enough people would know not to trust people calling about computer issues that the scam would stop being profitable to the scammers.

I couldn't have been more wrong, and no one knows this better than Jérôme: on the Malwarebytes blog, he has written many posts about his adventures with support scammers. Adventures which tend to be quite hilarious - until one realises that real people continue to fall victim to such scams.

In his paper, Jérôme explains how the scam has evolved: not only do many callers no longer claim they are calling on behalf of Microsoft, they have also broadened their scope, and apart from Windows are now also targeting Mac and Android users.

Scammers continue to find inventive ways to 'prove' something is wrong with the victim's computer or device, such as a failing ping to protection.com (a domain that doesn't accept ICMP requests) or the 'ESTABLISHED' shown by the netstat command as a proof that bad guys are currently and actively stealing all your information.

  Netflix phishing page leading to support scams. Source: Malwarebytes.

In one instance, the scammers used a Netflix phishing page which gave a login error (but allowed the crooks to steal the credentials) and urged the victim to call a phone number, upon which they would be told that their computer had been hacked - something that could only be fixed after paying a hefty fee.

Support scams continue to evolve, and in his presentation, Jérôme will talk about a number of recent developments that occurred after he submitted the paper. These include scammers claiming to be the official support technicians of various security products (something that no doubt will be of interest to many attendees), as well as further evidence of scams operating from within the US itself.

  Scareware leading to support scams. Source: Malwarebytes.

The paper finishes with a number of useful suggestions for those who, like Jérôme, want to gather intelligence on support scammers. Many will not want to go as far as the Metasploit researcher who released a zero-day exploit in Ammyy, a remote access tool popular among scammers, with the purpose of 'fighting back'. However, there are other, less ethically dubious ways to gather intelligence on these scams and the tactics used; they will help prevent people from falling victim.

VB2014 takes place next week in Seattle. Registration for VB2014 is still possible.

Posted on 22 September 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New article: Dissecting the design and vulnerabilities in AZORult C&C panels

In a new article, Aditya K Sood looks at the command-and-control (C&C) design of the AZORult malware, discussing his team's findings related to the C&C design and some security issues they identified.

VB2021 localhost call for papers: a great opportunity

VB2021 localhost presents an exciting opportunity to share your research with an even wider cross section of the IT security community around the world than usual, without having to take time out of your work schedule (or budget) to travel.

New article: Excel Formula/Macro in .xlsb?

In a follow-up to an article published last week, Kurt Natvig takes us through the analysis of a new malicious sample using the .xlsb file format.

New article: Decompiling Excel Formula (XF) 4.0 malware

In a new article, researcher Kurt Natvig takes a close look at XF 4.0 malware.

The Bagsu banker case - presentation

At VB2019, CSIS researcher Benoît Ancel spoke about a quiet banking trojan actor that has been targeting German users since at least 2014.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.